←back to thread

314 points Bogdanp | 1 comments | | HN request time: 0.201s | source
Show context
sschueller ◴[] No.44385074[source]
What about internal IPv4 addresses? Can we have browsers ignore 192.168.x.x, 172.16.x.x and 10.x.x.x if we can't get certs for those or can we get a public wildcard for internal networks?
replies(4): >>44385117 #>>44385282 #>>44385784 #>>44386470 #
1. jeroenhd ◴[] No.44385282[source]
If you can somehow prove that your device can manage to have a private key that will never be extractable then you should already be able to do that with any regular CA.

The problem with certificates for internal addresses is that every single time someone tries to pull it off, it doesn't take long for someone to buy one of those devices, extract the private key, and then post about it online, requiring the key to be revoked immediately.

There is a solution to that, of course. If you trust your device, import its certificate manually so you can visit the page without errors, or if you have a lot of devices, set up a certificate authority to distribute these certificates. There are open source ACME servers that'll let you publish certificates the exact same way you'd do with Let's Encrypt, except now you can keep everything local.